Pages

Ads 468x60px

Labels

Featured Posts

This is default featured slide 1 title

Easy to customize it, from your blogger dashboard, not needed to know the codes etc. Video tutorial is available, also a support forum which will help to install template correctly. By DeluxeTemplates.net

This is default featured slide 2 title

Easy to customize it, from your blogger dashboard, not needed to know the codes etc. Video tutorial is available, also a support forum which will help to install template correctly. By DeluxeTemplates.net

This is default featured slide 3 title

Easy to customize it, from your blogger dashboard, not needed to know the codes etc. Video tutorial is available, also a support forum which will help to install template correctly. By DeluxeTemplates.net

This is default featured slide 4 title

Easy to customize it, from your blogger dashboard, not needed to know the codes etc. Video tutorial is available, also a support forum which will help to install template correctly. By DeluxeTemplates.net

This is default featured slide 5 title

Easy to customize it, from your blogger dashboard, not needed to know the codes etc. Video tutorial is available, also a support forum which will help to install template correctly. By DeluxeTemplates.net

Tuesday, July 31, 2012

Upload Animated Pictures on Facebook Page/Profile [Cover Photo and Life Events]



To insert animated picture on your profile’s cover picture:
Step #1: Go to someone’s Timeline, example mine. You can also make use of any page.
Step #2: Open the Cover Photo.
Step #3: Analyse the URL of the picture. Copy the value of fbid and paste it in Notepad for easy use.
Example: If you find a URL like the one below, then the fbid is 500330216647437
https://www.facebook.com/photo.php?fbid=500330216647437&set=a.341957575818036.98360.100000113880511&type=1&theater

Step #4: Go to your Profile and hover on your timeline. Choose Change Cover option. Select Choose from Photos and select any album of yours.

Step #5: Right click on the first picture and choose Inspect element.

Step #6: Find something in the code as shown in the below picture. This will look like fbid which you copied from others profile or page. Just replace that ID with the one which you copied from other page or profile. To replace the ID, double click on it. 

Step #7: Click on the first picture which you right clicked for changing the code (set it as cover picture). Now, it’s time for you to show off your friends or fans.
You can also insert animated cover photo on Facebook page. Follow the same above method for pages.
To insert animated picture on Life event:
Step 1: Go to someone’s timeline and see about of theirs. You may also use my profile. I have some animated images added in my Life event. you can make use of that. My profile link is available in the step 1 of the above tutorial.
Step 2: Open the picture which gets animated on their Life event. Please note, that you can also use your other’s animated cover photo for inserting it into your timeline.

Step 3: Copy the value of fbid from the Photo URL.
Step 4: Go to your profile and in status box, choose Life Event. Choose any type of event, say Travel & Experiences > other Life Event > Choose from photos.
Step 5: Enter the name for the event and click on Choose from Photos. From now, Follow the Step #5, #6, #7 of the above tutorial.

Some animated fbid : 
503736009640191290122814428559254150484703214166611270140108,
3401371797303  ** will update more **
Thanks to : Arjun.
                                


Saturday, July 14, 2012

5 Type's of Hacker

Types of Hacker

A hacker is basically someone who breaks into computer networks or standalone personal computer systems for the challenge of it or because they want to profit from their innate hacking capabilities. The hacker subculture that has developed among these new-age outlaws is often defined as the computer underground, although as of late it has evolved into a more open society of sorts. At any rate, here are the different types of hackers.

White Hat: A white hat hacker is someone who has non-malicious intent whenever he breaks into security systems and whatnot. In fact, a large number of white hat hackers are security experts themselves who want to push the boundaries of their own IT security ciphers and shields or even penetration testers specifically hired to test out how vulnerable or impenetrable (at the time) a present protective setup currently is. A white hat that does vulnerability assessments and penetration tests is also known as an ethical hacker.


Black Hat: A black hat hacker, also known as a cracker, is the type of hacker that has malicious intent whenever he goes about breaking into computer security systems with the use of technology such as a network, phone system, or computer and without authorization. His malevolent purposes can range from all sorts cybercrimes such as piracy, identity theft, credit card fraud, vandalism, and so forth. He may or may not utilize questionable tactics such as deploying worms and malicious sites to meet his ends.


Grey Hat: A grey hat hacker is someone who exhibits traits from both white hats and black hats. More to the point, this is the kind of hacker that isn't a penetration tester but will go ahead and surf the Internet for vulnerable systems he could exploit. Like a white hat, he'll inform the administrator of the website of the vulnerabilities he found after hacking through the site. Like a black hat and unlike a pen tester, he'll hack any site freely and without any prompting or authorization from owners whatsoever. He'll even offer to repair the vulnerable site he exposed in the first place for a small fee.


Elite Hacker: As with any society, better than average people are rewarded for their talent and treated as special. This social status among the hacker underground, the elite (or, according to the hacker language that eventually devolved into leetspeak, 31337) are the hackers among hackers in this subculture of sorts. They're the masters of deception that have a solid reputation among their peers as the cream of the hacker crop.


Script Kiddie: A script kiddie is basically an amateur or non-expert hacker wannabe who breaks into people's computer systems not through his knowledge in IT security and the ins and outs of a given website, but through the prepackaged automated scripts (hence the name), tools, and software written by people who are real hackers, unlike him. He usually has little to know knowledge of the underlying concept behind how those scripts he has on hand works.

How to make Bootable USB of Windows 7/Vista/XP



Hey fellows. Today i will teach you how to make boot-able use to install windows. Now most of us Don't buy CD's so it is better to use our pen drive to install windows. There are many way to make boot-able USB. The best and easy way is that you can use Microsoft Windows7-USB-DVD-tool. This software tool is normally given by Microsoft and you purchase from the online Microsoft Store. This is really simple way to download window iso or use CD/DVD and make it bootable windows 7 in USB pen drive.
        
To download: Link  //**UPDATED**//

Download it form the link above and install it. just need to do next next and finish.
Then open file and you will see some thing like this

Click on Browse button and select the ISO image of windows. And than Click Next



Now you can create bootable USB or DVD. 1 more thing that if you make a bootable DVD then you will not able to use that DVD for any other purpose. If you DVD is RW DVD then you can delete data from your DVD. So it is better to use USB. It cheap and work same as DVD and USB can over write again and again :P Make sure you put USB or DVD in you PC before this Process.

For USB you have to select right drive which you want to make it bootable device.


Now select the right device and click Begin copying




Then this pop up came and ask you to totally formate your pen drive. I recommend you to double check that if any important data remain's. When you are sure that no important data is pen Drive then Click Erase USB Device

This pop up will appear just to again warn you that recheck your drive and just click Yes



When you click Yes then this window will come and that will take a little while to create bootable.
Just start a song and chill for some time until that process will complete.


Congrats you have successfully Created the bootable USB device. just close this window. Start over is just to make any other bootable which now we are not interested.  Now you can use this USB to install operating system.

*If you got any issue feel free to ask us. Enjoy and C ya!

Friday, July 13, 2012

How to track and recover your stolen laptop/iphone with Prey

Prey is a useful and easy-to-use application that would help recover your laptop/iphone from stolen. Once installed, this application will sleep in the background of your device's operating systems. And when your laptop is stolen you can tell it to awake and do magic things. For example, you can tell it to report the locations of your stolen laptop. You can also request it to pop up an alert or lock the laptop. This client application can also take pictures of the thief with your laptop's web cam. These information are stored in Prey servers and you can then access them from any computer by visiting Prey Control Panel and logging using your account or by accessing your emails.

To start, you will need to download and install the Prey software. Visit the Prey homepage and, when the page appears click the Download now button. If the File Download Security Warning dialogue box appears, click Save and then choose a location for the downloaded file. Firefox users should select Save File to save the download to Firefox's default download folder. Now click the purple Close button in the web browser window.

Now locate and double-click the downloaded file to launch the installation wizard. Work through this, accept the default options and, at the last screen, ensure the ‘Configure Prey Settings' box is ticked before clicking Finish. At the Prey Configurator dialogue box click OK. At the next stage, ensure ‘Setup reporting method' is selected and click Next. Select the ‘Prey + Control Panel' reporting method and click the Next button to continue.

As this is the first time Prey has been launched, select New user and then click Next. At the following screen type in your name, email address and enter a password. Now type in a name for the computer so it can be easily identified later and choose Desktop or Portable from the Device dropdown list. Then click the Create button to open a Prey account. Click the OK button to confirm and then click OK again to close the Prey Configurator.
Prey will now send a confirmation email, so launch your email program and check for the message. When it arrives, open it and click the link in the body of the email to complete the sign-up process. After a moment the web browser will launch and display the Prey login page. Type in the email address and password entered in Step 3 and then click the Login button.
The Prey control panel appears with the device listed - a notebook PC, in our case. To set up how Prey monitors and reports on this PC, click the picture of the device. Scroll down the settings and ensure that the Notify new reports option is set to Yes (as Prey will send emails when it wants to alert you of something) and then set the frequency of the reports to an appropriate number of minutes - the default is 20 which should be fine. To finish setting up Prey, click the Modules link at the top.
Now we need to set up the Report modules that tell Prey what information we want to see should our laptop get lost or stolen. Start by turning the Network setting to On. This opens a selection of options that can help trace a missing computer. Ensure that all three options - Active Connections, Wifi Hotspots and Trace Route are also set to On. Then turn the Session button to On. The key setting here is Get Screenshot, which will allow Prey to surreptitiously grab a picture of whatever is currently being displayed on the PC's screen.
Finally, be sure to set both the Webcam and Geo switch to On. This will allow Prey to take control of your PC's webcam (if it has one) and take a photo of whoever is using the computer, as well as using any nearby Wifi hotspots to generate a Google Map showing an approximation of its location. When done, click the orange Save changes button at the bottom right of the screen. To test it, click the Configuration link at the top again and then set the Missing option to Yes. Then click Save changes.
Prey now believes that our notebook PC is missing and has been set up to report back every 20 minutes. Obviously the information that Prey can deliver depends on whether the PC is being used, has a camera and is connected to the Internet. As soon as an Internet connection is detected, you will receive an email from Prey confirming that your device is marked as missing. Then, 20 minutes later another will arrive to say that a report is available. Open the email and click the link.

If necessary, sign into the Prey website again. The missing computer will be flagged with a red screen and a large green button next to it labelled ‘New report'. As reports come in, they will be flagged here and listed down the left-hand side. The free version of Prey will store up to 10 reports per registered device. Click the New report button to continue.

If everything is working, here is what you will get. A report that shows the location of the missing computer based on nearby Wifi networks. If the computer has a webcam attached (our missing notebook has one built in), you will even get a photo of the perpetrator. All of this information is recorded covertly, so a thief has no idea what's going on. If the traced computer was stolen, we would strongly advise passing the information gathered by Prey on to the police.